International Conference on Trusted Systems最新文献

筛选
英文 中文
Secure (M+1) st-Price Auction with Automatic Tie-Break 安全(M+1) st-价格拍卖与自动抢断
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_27
T. Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, K. Ohta
{"title":"Secure (M+1) st-Price Auction with Automatic Tie-Break","authors":"T. Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, K. Ohta","doi":"10.1007/978-3-319-27998-5_27","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_27","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The PACE|CA Protocol for Machine Readable Travel Documents 机器可读旅行证件的PACE|CA协议
International Conference on Trusted Systems Pub Date : 2013-12-04 DOI: 10.1007/978-3-319-03491-1_2
Jens Bender, M. Fischlin, D. Kügler
{"title":"The PACE|CA Protocol for Machine Readable Travel Documents","authors":"Jens Bender, M. Fischlin, D. Kügler","doi":"10.1007/978-3-319-03491-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions 一种降低物理不可克隆函数错误率的空间多数投票技术
International Conference on Trusted Systems Pub Date : 2013-12-04 DOI: 10.1007/978-3-319-03491-1_3
Patrick Koeberl, Jiangtao Li, Wei Wu
{"title":"A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions","authors":"Patrick Koeberl, Jiangtao Li, Wei Wu","doi":"10.1007/978-3-319-03491-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_3","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132645867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Policy Engineering for Attribute-Based Access Control 基于属性的访问控制策略工程研究
International Conference on Trusted Systems Pub Date : 2013-12-04 DOI: 10.1007/978-3-319-03491-1_6
Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin
{"title":"Towards Policy Engineering for Attribute-Based Access Control","authors":"Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin","doi":"10.1007/978-3-319-03491-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_6","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments 移动环境中可信应用程序执行的远程策略实施
International Conference on Trusted Systems Pub Date : 2013-12-04 DOI: 10.1007/978-3-319-03491-1_5
F. Martinelli, I. Matteucci, A. Saracino, D. Sgandurra
{"title":"Remote Policy Enforcement for Trusted Application Execution in Mobile Environments","authors":"F. Martinelli, I. Matteucci, A. Saracino, D. Sgandurra","doi":"10.1007/978-3-319-03491-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124316577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Active File Integrity Monitoring Using Paravirtualized Filesystems 使用半虚拟化文件系统的活动文件完整性监控
International Conference on Trusted Systems Pub Date : 2013-12-04 DOI: 10.1007/978-3-319-03491-1_4
Michael Velten, Sascha Wessel, F. Stumpf, C. Eckert
{"title":"Active File Integrity Monitoring Using Paravirtualized Filesystems","authors":"Michael Velten, Sascha Wessel, F. Stumpf, C. Eckert","doi":"10.1007/978-3-319-03491-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification 可信平台模块的准虚拟化:基于2.0规范的企业框架
International Conference on Trusted Systems Pub Date : 2013-12-04 DOI: 10.1007/978-3-319-03491-1_1
Jiun Yi Yap, A. Tomlinson
{"title":"Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification","authors":"Jiun Yi Yap, A. Tomlinson","doi":"10.1007/978-3-319-03491-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Implementation of Asynchronous Method Calls and Futures 异步方法调用和未来的安全实现
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_3
Peeter Laud
{"title":"Secure Implementation of Asynchronous Method Calls and Futures","authors":"Peeter Laud","doi":"10.1007/978-3-642-35371-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_3","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Analysis of Security Properties of the TPM 自动分析TPM安全属性
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_1
M. Ryan
{"title":"Automatic Analysis of Security Properties of the TPM","authors":"M. Ryan","doi":"10.1007/978-3-642-35371-0_1","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees 戳和扩展-基于懒惰树的即时但不可否认的时间戳
International Conference on Trusted Systems Pub Date : 2012-12-17 DOI: 10.1007/978-3-642-35371-0_2
L. Krzywiecki, Przemyslaw Kubiak, Mirosław Kutyłowski
{"title":"Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees","authors":"L. Krzywiecki, Przemyslaw Kubiak, Mirosław Kutyłowski","doi":"10.1007/978-3-642-35371-0_2","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信